recommended reading

The Navy Battles for ‘E*WARFARE’ Brand


The Navy has trademarked the name "e*WARFARE" and registered to reserve the rights to "E*WARFARE" in a preemptive move to deflect lawyers and fraudsters.

As of last week, e*WARFARE -- lowercase "e" and "WARFARE" in all capital letters, with an asterisk -- is the exclusive logo for official electronic warfare publications, according to Navy officials.

And it’s likely E*WARFARE -- all caps with an asterisk – will be the brand name on military e-books, hard-copy materials and informational discussions about the topic.

The brand’s insignia has some snazzy graphics. 

"All the wording is underscored by a lightning bolt," states the Office of Naval Research's trademark filing.  

The rights cover the stylized rendering of the characters.

The real benefit of trademarking the name is that it will help deal with confusingly similar uses of the term, Geoffrey M. McNutt, associate counsel for the Office of Naval Research, told Nextgov today.

A federal registration "provides notice" and practical information to attorneys and Internet-savvy business people who might be considering claiming rights, he said. 

"There could be deliberate infringements. There could also be innocent infringements," McNutt acknowledged. There could be "someone with bad intent who is deliberately trying to rub up against the Navy's reputation for being knowledgeable in this area.”

By law, however, the military doesn't need to register the trademark to sue scammers who, for example, sell bogus "official" military E*WARFARE videogames.  

The rights come in handy when a company applies for a similar trademark at USPTO, McNutt said.

"The Patent and Trademark Office would cite our prior registration against a similar-looking trademark," he said. In addition, the rights offer the Navy a presumption of ownership.

"And also it provides actual notice so the types of people who want to do things the right way, want to do a search, steer clear of a similar mark,” McNutt said.

Last week, Chief of Naval Operations Adm. Jonathan Greenert emphasized the relationship between electronic warfare and the Navy's purpose.

"Control of the information is going to be the key to the future," he said at a Space and Naval Warfare Systems Command change of command ceremony. The cyber tools aboard Navy Growler planes jam adversary electronic systems so U.S. combat aircraft can safely attack.   

"Until we put a pod on the Growlers, with all the electronics working to dominate the electromagnetic spectrum, they're just aircraft flying around burning fuel,” Greenert said.  

According to a USPTO trademark application submitted Friday, “E*WARFARE” would be reserved for "downloadable books in the field of electronic, information technology and cyber warfare techniques and technology" as well as "printed publications, namely, brochures, booklets and teaching materials in the field of electronic, information technology and cyber warfare techniques and technology to the warfighter."

A third use described is very similar to the one for “e*WARFARE”: 

“Providing information to the public about the provision of electronic, information technology and cyber warfare techniques and technology to the warfighter, namely, providing information to the public about the Electronic Warfare Systems Architecture (EWSA) and Electronic Warfare Battle Management (EWBM), which allows for specific delivery of technological adversarial effects on computer, communication, Electronic Warfare (EW) and networking systems to create warfighting effects in the battlespace against hostile entities through technological means identified by the EWSA/EWBM specific processes and engineering; providing information to the public about research, test and development in the field of the EWSA and EWBM in the context of fielding of warfighting capabilities; providing information to the public about the EWBM (Electronic Warfare Battle Management) services architecture, which provides technology for real-time cueing, display, and delivery of electronic warfare information and cyber warfare activities; providing information to the public about the management of electronic warfare technologies delivered to warfighters and acquisition systems that produce measurable and effective warfighting EW effects in spectrum, information operations and related cyber engagements.”

(Image via Sangoiri/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.